SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
ISSN: 2278 – 1323
                                       International Journal of Advanced Research in Computer Engineering & Technology
                                                                                           Volume 1, Issue 4, June 2012



     Simulation and Analysis of Dropped Packets for
               DSR Protocol in VANETs
                                              Avleen Kaur Malhi, A. K. Verma


                                                                    communications. While the major objective has clearly been
   Abstract— VANET (Vehicular Adhoc Network) is a new                to improve the overall safety of vehicular traffic, promising
concept in the field of wireless networks. The main objective of     traffic management solutions.
VANET is to build a powerful network between mobile vehicles
so that the vehicles can talk to each other for the safety of the
humans. The various protocols are being used in VANET
environment. The aim of work is to simulate and analyze the
DSR (Dynamic Source Routing) protocol in VANET. DSR
protocol is simulated under realistic scenario with the help of
mobility models. The work has been carried out with the help of
open-source simulation tools on realistic scenario of traffic with
the help of MOVE, SUMO and NS-2. The performance of DSR
protocol is tested for the number of dropped packets during the
simulation and results are also compared by varying the
number of nodes used for simulation. The analysis indicate that
there is increase in the number of dropped packets used as and
the average throughput of dropped packets also increases the
number of nodes are increased.
Index Terms— VANET, DSR, NS-2, SUMO, MOVE

                                                                               Figure 1. VANET Example
                      I. INTRODUCTION
                                                                     VANETs are characterized by[2]:
 In the recent years, vehicular networking has gained a lot of        high velocity of the vehicles
popularity among the industry and academic research
                                                                      environment factors: obstacles, traffic jams, etc.
community and is seen to be the most valuable concept for
                                                                      determined mobility patterns that depend on source to
improving efficiency and safety for future transportations. A
                                                                       destination path and on traffic conditions
Vehicular Ad-Hoc network is a form of Mobile ad-hoc
                                                                      intermittent communications (isolated networks of cars
Networks, to provide communication among nearby vehicles
                                                                       due to the fragmentation of the network)
and between vehicles and nearby fixed equipment i.e.
roadside equipment. The main goal of VANET is providing               high congestion channels (e.g. due to high density of
safety and comfort for passengers.                                     nodes).
The important factors that would influence the adoption of           In this paper, we have analyzed the performance of Adhoc
VANET architecture for future vehicular applications would           Routing Protocol, DSR protocol by taking the different
be -                                                                 parameters such as cumulative sum of dropped packets,
      Low latency requirements for safety applications              throughput and packet size.
      Extensive growth of interactive and multimedia
          applications
      Increasing concerns about privacy and security                              II. APPLICATIONS IN VANETS
                                                                     Transportation-related applications[3] are those applications
A view of such a network is shown in Figure 1. It is estimated
                                                                     that increase the safety of the driver and passengers.
that the first systems that will integrate this technology are
                                                                     Transportation-related applications range from safety
police and fire vehicles to communicate with each other for
                                                                     applications such as cooperative forward collision warning or
safety purposes. Further, A novel type of wireless access
                                                                     extended electronic brake lights to traffic management
called Wireless Access for Vehicular Environment (WAVE)
                                                                     applications such as road-condition warnings or alternative
is dedicated to vehicle-to-vehicle and vehicle-to-roadside
                                                                     route warnings. Convenience and personalized applications
   Manuscript received june 20, 2012.                                increase the comfort of the driver and passengers.
    Avleen Kaur Malhi, Computer Scince and Engineering Department,
                                                                     Transportation-related applications and Convenience and
Thapar University, Patiala, India, Mobile No. 9530505253,(e-mail:
avleen.malhi@gmail.com)                                              personalized applications have a set of requirements that is
   A. K. Verma, Computer Scince and Engineering Department, Thapar   common to almost all applications. The most interesting
University, Patiala, India, Mobile No. 9888601667, (e-mail:          requirements are: coverage should be in the range of 10 to
akverma@thapar.edu)

                                                                                                                              267
                                               All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                     International Journal of Advanced Research in Computer Engineering & Technology
                                                                                         Volume 1, Issue 4, June 2012

1000 meters with a car maximum relative speed of 500 Km/h.        The proactive routing means that the routing information like
Latency ranges between 50 ms to 500 ms.                           next forwarding hope is maintained in the background
In general, safety applications should not wait more than 200     irrespective of communication requests. Reactive Routing
ms. A likely situation may arise in case there are traffic jams   Protocols implement route determination on a demand or
and redundant packets of multiple nodes consume the               need basis and maintain only the routes that are currently in
bandwidth.                                                        use, thereby reducing the burden on the network when only a
                                                                  subset of available routes is in use at any time . Position based
                                                                  routing Protocols share the property of using geographic
  A. Safety Related Applications
                                                                  positioning information in order to select the next forwarding
Typical safety applications are characterized as being            hops.
applications in which the main objective is to disseminate        In our simulation, we have used the Reactive Routing
certain event that have occurred in the vicinity of the sender.   Protocols, namely DSR.
Some examples described are:
                                                                    A. DSR
 Cooperative awareness: to extend non-cooperative driver         Dynamic source routing (DSR) [6] protocol is one of the
   assistance systems whose perception is limited to the          example of an on-demand routing protocol that is based on
   operative range of on-board sensors (adverse weather,          the concept of source routing. The DSR network is totally
   obstacles or dangerous road conditions).                       self organizing and self configuring. DSR uses no periodic
 Cooperative assistance: distribution of data (e.g. warning      routing messages like AODV, thereby reduces network
   of accidents).                                                 bandwidth overhead, conserves battery power and avoids
                                                                  large routing updates.
 B. Convenience and Personalized Applications                     The DSR routing protocol discovers routes and maintains
Typical Convenience and personalized applications[4] are:         information regarding the routes from one node to other by
 Car to Mobile devices: Those applications between the car       using two main mechanisms: route discovery and route
   and mobile devices (e.g. mobile phone, MP3, laptop, etc).      maintenance. The DSR regularly updates its route cache for
 Car to Home and Car to Office: Communications between           the sake of new available easy routes. Route Discovery is the
   the car and private networks either at home or at office.      mechanism by which a node S wishing to send a packet to a
 Car to Enterprise: Communications between the car and           destination node D obtains a source route to D. Route
   companies (e.g. restaurants, gas stations, parking areas,      Discovery is used only when S attempts to send a packet to D
   etc) that give road services.                                  and does not already know a route to D. Route Maintenance
 Car to infrastructure: Information received by a car from       is the mechanism by which node S is able to detect, with the
   hot spots giving road and traffic information and car          help of a source route to D, if the network topology has
   access to Internet.                                            changed such that it can no longer use its route to D because a
 Car to Car: Exchange of information between car users           link along the route no longer works. If a link failure is found
   (e.g. files, platoon traveling, etc).                          between source and destination, the source node tries to find
                                                                  another route to the destination or invokes Route Discovery
                                                                  DSR has a unique advantage of source routing.
                                                                  As the route is part of the packet itself, routing loops, either
                 III. ROUTING PROTOCOLS                           short – lived or long – lived, cannot be formed as they can be
                                                                  immediately detected and eliminated. The packet in DSR
In VANET, the routing protocols are classified into two           carries all information pertaining to route in its preamble
categories: Topology based and Position based Routing             (header) thus permitting the intermediate nodes to cache the
Protocols. Topology based routing protocols use links             routing information in their route tables for their future use.
information that exist in the network to perform packet
forwarding. They are further divided into Proactive and                       IV. RESEARCH METHODOLOGY USED
Reactive.
                                                                  To carry out the experiments in this paper, MOVE along with
                                                                  SUMO and NS2 is used.

                                                                    A. MOVE
                                                                     A tool MOVE (MObility model generator for Vehicular
                                                                  networks) [7] to facilitate users to rapidly generate realistic
                                                                  mobility models for VANET simulations. MOVE is currently
                                                                  implemented in java and is built on top of an open source
                                                                  micro-traffic simulator SUMO. By providing a set of
                                                                  Graphical User Interfaces that automate the simulation script
                                                                  generation, MOVE allows the user to quickly generate
                                                                  realistic simulation scenarios without the hassle of writing
                                                                  simulation scripts as well as learning about the internal
                                                                  details of the simulator. The output of MOVE is a mobility
       Figure 2. Classification of routing protocols[5]
                                                                  trace file that contains information about realistic vehicle
                                                                  movements which can be immediately used by popular

                                                                                                                              268
                                             All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                      International Journal of Advanced Research in Computer Engineering & Technology
                                                                                          Volume 1, Issue 4, June 2012

simulation tools such as ns-2. The architecture of MOVE is         It consists of two simulation tools. The network simulator
shown in Figure 3.                                                 (ns) contains all commonly used IP protocols. The network
The two main function of MOVE are:                                 animator (NAM) is use to visualize the simulations.
      MAP Editor                                                  It is packaged with a bundle of rich libraries for simulating
      Vehicle Movement Editor                                     wireless networks. All the mobile nodes in NS-2 quickly
The Map Editor is used to create the road topology. Currently      assume that they are the part of Ad-hoc network and the
our implementation provides three different ways to create         simulation mobile nodes connected with infrastructure
the road map – the map can be manually created by the user,        networks are not really possible.
generated automatically, or imported from existing real
world maps such as publicly available TIGER. We have also                                     V. SIMULATION
integrated Google Earth into MOVE to facilitate the creation          The simulation parameters used and the simulation setup
of nodes in a realistic setting. The Vehicle Movement Editor       for this study are described in this section.
allows the user to specify the trips of vehicles and the route
that each vehicle will take for one particular trip.
                                                                     A. Simulation Setup
                                                                   Simulation environment consists of 4,10 and 15 wireless
                                                                   vehicle nodes which are moving on the lanes of mobility
                                                                   model used and forming a Vehicular Ad-hoc Network,
                                                                   moving about over a 652meters X 752 meters area for 1000
                                                                   seconds of simulated time.
                                                                   The table below list the details of the simulation setup used in
                                                                   this simulation based analysis of DSR protocol.

                                                                                        Table 1: Simulation Setup
                Figure 3. MOVE architecture
  B. SUMO                                                            NS version                        NS-2.33
     “Simulation of Urban MObility" (SUMO) [8] is an open
                                                                     MOVE version                      2.64
source, highly portable, microscopic road traffic simulation
package designed to handle large road networks. It allows the        SUMO version                      0.12.3
user to build a customized road topology, in addition to the
import of different readymade map formats of many cities           Tracegraph version                  2.0.2
and towns of the world. Figure 4. shows SUMO
visualization.                                                       DSR                               NS-2 Default

                                                                     No. Of nodes                      4,10,15

                                                                     Traffic type                      TCP

                                                                     Channel Type                      Wireless Channel

                                                                     Network Interface Type            Wireless physical

                                                                     Antenna model                     Omnidirectional

                                                                     Radio Propagation Model           Two Ray Ground

                                                                     Adhoc Routing Protocol            DSR
                 Figure 4. SUMO Visualization
                                                                     MAC type                          IEEE 802.11
  C. NS-2
     The Network Simulator (ns2) [9] is a discrete event             Simulation Time                   1000 seconds
driven simulator developed at UC Berkeley. We are using
Network Simulator NS2 for simulations of protocols. It               Data Type                         CBR(Constant Bit Rate)
provides substantial support for simulation of TCP, routing
and multicast protocols over wired and wireless networks.            Data packet size                  1000 bytes
Ns-2 code is written either in C++ and OTCL and is kept in a
                                                                     Window Size                       20
separate file that is executed by OTCL interpreter, thus
generating an output file for NAM (Network animator) [10].           Scenario                          Urban
It then plots the nodes in a position defined by the code script
                                                                     Road Traffic Direction
and exhibits the output of the nodes communicating with                                                Multidirectional
each other.
                                                                     Queue Length                      50


                                                                                                                                269
                                                All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                       International Journal of Advanced Research in Computer Engineering & Technology
                                                                                           Volume 1, Issue 4, June 2012



   B. Simulation Parameters
For this study three performance metrics are selected
namely:-

1) Throughput: Throughput describes as the total number of
received packets at the destination out of total transmitted
packets. It is the average rate of successful message delivery
over a communication channel. It is the number of received
packets per TIL (Time Interval Length). This data may be
delivered over a physical or logical link, or pass through a
certain network node. The throughput is usually measured
                                                                   Figure 6. Cumulative sum of dropped packets vs event time
in bits per second (bit/s or bps), and sometimes in data
                                                                                          for 10 nodes
packets per second or data packets per time interval
length(TIL).

Total no. of received packets at destination * packet size
T = ----------------------------------------------------------
          Total simulation time

2) Packets drop: The number of packets dropped at a given
instance of time in the simulation run determines the
efficiency of the protocol. The reason for packet drop may
arise due to congestion, faulty hardware and queue overflow
etc.

3) Simulation Time: It describes the total time taken by the       Figure 7. Cumulative sum of dropped packets vs event time
simulator NS-2 to simulate the individual routing protocol.                               for 15 nodes


                 VI. RESULTS AND ANALYSIS                         INFERENCE: The number of dropped packets increases
                                                                  with the increase in number of nodes. The packet loss is
The DSR protocol is being simulated over a realistic mobility     always more at the initial stage and then increases slowly
model and the results are analyzed in different node densities    with the event time. The event time interval also decreases as
of 4 nodes, 10 nodes and 15 nodes.                                the number of nodes increases due to the increase in dropped
                                                                  packets.
 A. Cumulative sum of dropped packets vs event time
                                                                    B. Throughput of dropping packets
In this case, the number of dropped packets are analysed in
three cases of 4 nodes, 10 nodes, and 15 nodes.
                                                                  Now, the throughput of dropped packets is analysed for 4, 10
                                                                  and 15 nodes.




Figure 5. Cumulative sum of dropped packets vs event time
                       for 4 nodes
                                                                     Figure 8. Throughput of dropping packets for 4 nodes




                                                                                                                            270
                                                All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                   International Journal of Advanced Research in Computer Engineering & Technology
                                                                                       Volume 1, Issue 4, June 2012




  Figure 9. Throughput of dropping packets for 10 nodes       Figure 12. Packet size vs Average throughput of dropping
                                                                                 packets for 10 nodes




  Figure 10. Throughput of dropping packets for 15 nodes
                                                              Figure 13. Packet size vs Average throughput of dropping
INFERENCE: As the number of nodes increases, the                                 packets for 15 nodes
steepness of graph increases as the throughput of dropping
packets increases with the number of nodes.                  INFERENCE: The highest ratio of dropped packets are of
                                                             lower sizes around 100 bytes. The maximum number of
 C. Packet size vs Average throughput of dropping packets    dropped packets are of size below 110 bytes.

The packet sizes are analysed for which there are more
number of packets dropped.                                                        VII.   CONCLUSION

                                                             VANETs are an important research field which is emerging
                                                             nowdays. It defines the important technology required to
                                                             support Intelligent       Transportation       Systems (ITS)
                                                             applications. Instead of developing the all new protocols for
                                                             VANET, an insight has been made to already existing
                                                             MANET protocols such as DSR.

                                                             DSR is a reactive routing protocol and has been extended on
                                                             VANET for simulations under MOVE and SUMO with
                                                             mobility models taken from MOVE. The experiment has
                                                             been conducted for 4 nodes, 10 nodes and 15 nodes to
                                                             understand the behavior of dropped packets. The analysis
                                                             against different parameters such as sum of dropped packets,
                                                             throughput and packet size has been done and following
 Figure 11. Packet size vs Average throughput of dropping
                                                             observations has been made:
                    packets for 4 nodes
                                                             1) The number of dropped packets increases with increase
                                                                in number of nodes.
                                                             2) The throughput of dropping packets increases with the
                                                                increase in the number of nodes from 4 to 15, as the

                                                                                                                      271
                                           All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                             International Journal of Advanced Research in Computer Engineering & Technology
                                                                                                 Volume 1, Issue 4, June 2012

     number of dropped packets increases.
3) The more number of dropped packets are recorded for
     the packet sizes between 80 to 100 bytes for all the three
     scenarios of 4, 10 and 15 nodes.
The maximum nodes considered in the work are 15 due to
hardware constraints of the computer. So, it would be
interesting to see the behaviour of the DSR protocol for the
higher number of nodes, for which the machine of higher
configuration will be required.


                         ACKNOWLEDGMENT
I would like to thank all the anonymous reviewers for their
constructive feedback on the work presented over here.



                                REFERENCES
[1]  Vanet Simulator, Report for the Computer Security exam at the
     Politecnico di Torino Walter Dal Mut, Armand Sofack.
[2] Thomas D.C. Little and Ashish Agarwal, “An Information Propagation
     Scheme for VANETs”, Proceedings of the 8th International IEEE
     Conference on Intelligent Transportation Systems, Vienna, Austria,
     September 13-16, 2005.
[3] Gayathri Chandrasekaran, “VANETs: The Networking Platform for
     Future Vehicular Applications”, Department of Computer Science,
     Rutgers University.
[4] R. Mangharam, D. Weller, R. Rajkumar, P. Mudalige, and F. Bai,
     “Groovenet: A hybrid simulator for vehicle-to-vehicle networks,” in
     Mobile and Ubiquitous Systems - Workshops,             3rd Annual
     International Conference , 2006.
[5] Kevin C. Lee, Uichin Lee, Mario Gerla,“Survey of Routing Protocols
     in          Vehicular          Ad          Hoc          Networks”,
     RoutingBookChapterKLULMario.pdf.
[6] Johnson, D. B. and Maltz, D. A. (1996), “Dynamic Source Routing in
     Ad Hoc Wireless Networks,” Mobile Computing, T. Imielinski and H.
     Korth, Eds., Ch. 5, Kluwer, 1996, pp. 153–81.
[7] Pranav Kumar Singh, Kapang Lego and Dr. Themrichon Tuithung,
     “Simulation based Analysis of Adhoc Routing Protocol in Urban and
     Highway Scenario of VANET”, International Journal of Computer
     Applications (0975 – 8887) Volume 12– No.10, January 2011.
[8] SUMO (2012). “Simulation of Urban Mobility”. Accessed on 11 May,
     2012 from http://sumo.sourceforge.net/docs/bibliography.shtml.
[9] Ke Liu “Network Simulator 2: Introduction”, Dept. Of Computer
     Science,        SUNY          Binghamton,        available       at
     http://www.cs.binghamton.edu/~kliu/cs580t/ns2pre.pdf.
[10] NAM Network Animator. http://www.isi.edu/nsnam/nam/




   Dr. A K Verma is currently a faculty in the department of Computer
Science and Engineering at Thapar University, Patiala. He received his B.S.,
M.S. and Doctorate in 1991, 2001 and 2008, respectively, majoring in
Computer science and engineering. He has worked as Lecturer at M.M.M.
Engg. College, Gorakhpur from 1991 to 1996. He joined Thapar University
in 1996 and is presently associated with the same Institute. He has been a
visiting faculty to many institutions. He has published over 100 papers in
referred journals and conferences (India and Abroad). He has chaired various
sessions in the International and National Conferences. He is a MIEEE,
MACM, MISCI, LMCSI, MIETE, GMAIMA. He is a certified software
quality auditor by MoCIT, Govt. of India. His research interests include
wireless networks, routing algorithms and cloud computing.
   Avleen Kaur Malhi is currently pursuing her M.E. in Computer Science
and Engineering from Thapar University. She is doing her thesis work in the
area of Wireless Ad-Hoc Networks. She has completed her B.Tech from
Guru Nanak Dev Engineering College, Ludhiana in 2010. Her research
interests are VANETs and Wireless Ad-hoc Networks.

                                                                                                                         272
                                                       All Rights Reserved © 2012 IJARCET

Weitere ähnliche Inhalte

Was ist angesagt?

Traffic Control System by Incorporating Message Forwarding Approach
Traffic Control System by Incorporating Message Forwarding ApproachTraffic Control System by Incorporating Message Forwarding Approach
Traffic Control System by Incorporating Message Forwarding ApproachCSCJournals
 
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...IJCNCJournal
 
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKSEFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKSijwmn
 
VANET for Security using Cryptography
VANET for Security using Cryptography VANET for Security using Cryptography
VANET for Security using Cryptography Pallavi Agarwal
 
11.signaling for multimedia conferencing in stand alone mobile ad hoc networks
11.signaling for multimedia conferencing in stand alone mobile ad hoc networks11.signaling for multimedia conferencing in stand alone mobile ad hoc networks
11.signaling for multimedia conferencing in stand alone mobile ad hoc networksAlexander Decker
 
Signaling for multimedia conferencing in stand alone mobile ad hoc networks
Signaling for multimedia conferencing in stand alone mobile ad hoc networksSignaling for multimedia conferencing in stand alone mobile ad hoc networks
Signaling for multimedia conferencing in stand alone mobile ad hoc networksAlexander Decker
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Evaluation The Performance of MAODV and AODV Protocols In VANETs Models
Evaluation The Performance of MAODV and AODV Protocols In VANETs ModelsEvaluation The Performance of MAODV and AODV Protocols In VANETs Models
Evaluation The Performance of MAODV and AODV Protocols In VANETs ModelsCSCJournals
 
Performance Analysis of Multi-QoS Model of OCDMA System by Adopting OPPM Sign...
Performance Analysis of Multi-QoS Model of OCDMA System by Adopting OPPM Sign...Performance Analysis of Multi-QoS Model of OCDMA System by Adopting OPPM Sign...
Performance Analysis of Multi-QoS Model of OCDMA System by Adopting OPPM Sign...IJERA Editor
 
Taking VANET to the Clouds
Taking VANET to the CloudsTaking VANET to the Clouds
Taking VANET to the CloudsMichele Weigle
 
SCRUTINY OF BROADCASTING PROTOCOLS IN VANET
SCRUTINY OF BROADCASTING PROTOCOLS IN VANETSCRUTINY OF BROADCASTING PROTOCOLS IN VANET
SCRUTINY OF BROADCASTING PROTOCOLS IN VANETijgca
 
4 g communication architecture
4 g communication  architecture4 g communication  architecture
4 g communication architectureIAEME Publication
 

Was ist angesagt? (17)

Traffic Control System by Incorporating Message Forwarding Approach
Traffic Control System by Incorporating Message Forwarding ApproachTraffic Control System by Incorporating Message Forwarding Approach
Traffic Control System by Incorporating Message Forwarding Approach
 
4315ijci01
4315ijci014315ijci01
4315ijci01
 
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
 
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKSEFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
 
VANET for Security using Cryptography
VANET for Security using Cryptography VANET for Security using Cryptography
VANET for Security using Cryptography
 
11.signaling for multimedia conferencing in stand alone mobile ad hoc networks
11.signaling for multimedia conferencing in stand alone mobile ad hoc networks11.signaling for multimedia conferencing in stand alone mobile ad hoc networks
11.signaling for multimedia conferencing in stand alone mobile ad hoc networks
 
Signaling for multimedia conferencing in stand alone mobile ad hoc networks
Signaling for multimedia conferencing in stand alone mobile ad hoc networksSignaling for multimedia conferencing in stand alone mobile ad hoc networks
Signaling for multimedia conferencing in stand alone mobile ad hoc networks
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Evaluation The Performance of MAODV and AODV Protocols In VANETs Models
Evaluation The Performance of MAODV and AODV Protocols In VANETs ModelsEvaluation The Performance of MAODV and AODV Protocols In VANETs Models
Evaluation The Performance of MAODV and AODV Protocols In VANETs Models
 
Mm wcmc v12
Mm wcmc v12Mm wcmc v12
Mm wcmc v12
 
Performance Analysis of Multi-QoS Model of OCDMA System by Adopting OPPM Sign...
Performance Analysis of Multi-QoS Model of OCDMA System by Adopting OPPM Sign...Performance Analysis of Multi-QoS Model of OCDMA System by Adopting OPPM Sign...
Performance Analysis of Multi-QoS Model of OCDMA System by Adopting OPPM Sign...
 
Taking VANET to the Clouds
Taking VANET to the CloudsTaking VANET to the Clouds
Taking VANET to the Clouds
 
SCRUTINY OF BROADCASTING PROTOCOLS IN VANET
SCRUTINY OF BROADCASTING PROTOCOLS IN VANETSCRUTINY OF BROADCASTING PROTOCOLS IN VANET
SCRUTINY OF BROADCASTING PROTOCOLS IN VANET
 
170 176
170 176170 176
170 176
 
VANET Clustering Survey
VANET Clustering SurveyVANET Clustering Survey
VANET Clustering Survey
 
Is3116341640
Is3116341640Is3116341640
Is3116341640
 
4 g communication architecture
4 g communication  architecture4 g communication  architecture
4 g communication architecture
 

Andere mochten auch

Houses in Kamalaya, Minglanilla
Houses in Kamalaya, MinglanillaHouses in Kamalaya, Minglanilla
Houses in Kamalaya, Minglanillaguestfff51ca
 
Presentació Concert Dia Dona 2009
Presentació Concert Dia Dona 2009Presentació Concert Dia Dona 2009
Presentació Concert Dia Dona 2009Pinyolets
 
begrippen hc6
begrippen hc6begrippen hc6
begrippen hc6laurux
 
Ijarcet vol-2-issue-7-2378-2383
Ijarcet vol-2-issue-7-2378-2383Ijarcet vol-2-issue-7-2378-2383
Ijarcet vol-2-issue-7-2378-2383Editor IJARCET
 

Andere mochten auch (8)

Houses in Kamalaya, Minglanilla
Houses in Kamalaya, MinglanillaHouses in Kamalaya, Minglanilla
Houses in Kamalaya, Minglanilla
 
Cli1 Bibalex
Cli1 BibalexCli1 Bibalex
Cli1 Bibalex
 
Presentació Concert Dia Dona 2009
Presentació Concert Dia Dona 2009Presentació Concert Dia Dona 2009
Presentació Concert Dia Dona 2009
 
Stuff
StuffStuff
Stuff
 
680 684
680 684680 684
680 684
 
Vietnam Ike
Vietnam  IkeVietnam  Ike
Vietnam Ike
 
begrippen hc6
begrippen hc6begrippen hc6
begrippen hc6
 
Ijarcet vol-2-issue-7-2378-2383
Ijarcet vol-2-issue-7-2378-2383Ijarcet vol-2-issue-7-2378-2383
Ijarcet vol-2-issue-7-2378-2383
 

Ähnlich wie 267 272

Performance evaluation of vanets
Performance evaluation of vanetsPerformance evaluation of vanets
Performance evaluation of vanetscsandit
 
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc NetworksCross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc NetworksIJCNCJournal
 
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKS
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKSCROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKS
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKSIJCNCJournal
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Technical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETTechnical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETPallavi Agarwal
 
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...IJERA Editor
 
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...pijans
 
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...pijans
 
Differential Evolution Based Secured Routing Protocols for VANETs
Differential Evolution Based Secured Routing Protocols for VANETsDifferential Evolution Based Secured Routing Protocols for VANETs
Differential Evolution Based Secured Routing Protocols for VANETsIJCSIS Research Publications
 
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc NetworkDeterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Networkpaperpublications3
 
Ijartes v1-i1-004
Ijartes v1-i1-004Ijartes v1-i1-004
Ijartes v1-i1-004IJARTES
 
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...IJLT EMAS
 
Edge computing for CAVs and VRU protection
Edge computing for CAVs and VRU protectionEdge computing for CAVs and VRU protection
Edge computing for CAVs and VRU protectionCarl Jackson
 
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)IRJET Journal
 

Ähnlich wie 267 272 (20)

Jh2516461655
Jh2516461655Jh2516461655
Jh2516461655
 
Jh2516461655
Jh2516461655Jh2516461655
Jh2516461655
 
Performance evaluation of vanets
Performance evaluation of vanetsPerformance evaluation of vanets
Performance evaluation of vanets
 
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc NetworksCross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
 
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKS
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKSCROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKS
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKS
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Technical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETTechnical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANET
 
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
 
24 83-1-pb
24 83-1-pb24 83-1-pb
24 83-1-pb
 
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
 
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
 
Differential Evolution Based Secured Routing Protocols for VANETs
Differential Evolution Based Secured Routing Protocols for VANETsDifferential Evolution Based Secured Routing Protocols for VANETs
Differential Evolution Based Secured Routing Protocols for VANETs
 
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc NetworkDeterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
 
Ijartes v1-i1-004
Ijartes v1-i1-004Ijartes v1-i1-004
Ijartes v1-i1-004
 
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
 
Jb3515641568
Jb3515641568Jb3515641568
Jb3515641568
 
Jn2416531655
Jn2416531655Jn2416531655
Jn2416531655
 
Edge computing for CAVs and VRU protection
Edge computing for CAVs and VRU protectionEdge computing for CAVs and VRU protection
Edge computing for CAVs and VRU protection
 
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
 

Mehr von Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationEditor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 
Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101Editor IJARCET
 

Mehr von Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 
Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101
 

Kürzlich hochgeladen

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Kürzlich hochgeladen (20)

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

267 272

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 Simulation and Analysis of Dropped Packets for DSR Protocol in VANETs Avleen Kaur Malhi, A. K. Verma  communications. While the major objective has clearly been Abstract— VANET (Vehicular Adhoc Network) is a new to improve the overall safety of vehicular traffic, promising concept in the field of wireless networks. The main objective of traffic management solutions. VANET is to build a powerful network between mobile vehicles so that the vehicles can talk to each other for the safety of the humans. The various protocols are being used in VANET environment. The aim of work is to simulate and analyze the DSR (Dynamic Source Routing) protocol in VANET. DSR protocol is simulated under realistic scenario with the help of mobility models. The work has been carried out with the help of open-source simulation tools on realistic scenario of traffic with the help of MOVE, SUMO and NS-2. The performance of DSR protocol is tested for the number of dropped packets during the simulation and results are also compared by varying the number of nodes used for simulation. The analysis indicate that there is increase in the number of dropped packets used as and the average throughput of dropped packets also increases the number of nodes are increased. Index Terms— VANET, DSR, NS-2, SUMO, MOVE Figure 1. VANET Example I. INTRODUCTION VANETs are characterized by[2]: In the recent years, vehicular networking has gained a lot of  high velocity of the vehicles popularity among the industry and academic research  environment factors: obstacles, traffic jams, etc. community and is seen to be the most valuable concept for  determined mobility patterns that depend on source to improving efficiency and safety for future transportations. A destination path and on traffic conditions Vehicular Ad-Hoc network is a form of Mobile ad-hoc  intermittent communications (isolated networks of cars Networks, to provide communication among nearby vehicles due to the fragmentation of the network) and between vehicles and nearby fixed equipment i.e. roadside equipment. The main goal of VANET is providing  high congestion channels (e.g. due to high density of safety and comfort for passengers. nodes). The important factors that would influence the adoption of In this paper, we have analyzed the performance of Adhoc VANET architecture for future vehicular applications would Routing Protocol, DSR protocol by taking the different be - parameters such as cumulative sum of dropped packets,  Low latency requirements for safety applications throughput and packet size.  Extensive growth of interactive and multimedia applications  Increasing concerns about privacy and security II. APPLICATIONS IN VANETS Transportation-related applications[3] are those applications A view of such a network is shown in Figure 1. It is estimated that increase the safety of the driver and passengers. that the first systems that will integrate this technology are Transportation-related applications range from safety police and fire vehicles to communicate with each other for applications such as cooperative forward collision warning or safety purposes. Further, A novel type of wireless access extended electronic brake lights to traffic management called Wireless Access for Vehicular Environment (WAVE) applications such as road-condition warnings or alternative is dedicated to vehicle-to-vehicle and vehicle-to-roadside route warnings. Convenience and personalized applications Manuscript received june 20, 2012. increase the comfort of the driver and passengers. Avleen Kaur Malhi, Computer Scince and Engineering Department, Transportation-related applications and Convenience and Thapar University, Patiala, India, Mobile No. 9530505253,(e-mail: avleen.malhi@gmail.com) personalized applications have a set of requirements that is A. K. Verma, Computer Scince and Engineering Department, Thapar common to almost all applications. The most interesting University, Patiala, India, Mobile No. 9888601667, (e-mail: requirements are: coverage should be in the range of 10 to akverma@thapar.edu) 267 All Rights Reserved © 2012 IJARCET
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 1000 meters with a car maximum relative speed of 500 Km/h. The proactive routing means that the routing information like Latency ranges between 50 ms to 500 ms. next forwarding hope is maintained in the background In general, safety applications should not wait more than 200 irrespective of communication requests. Reactive Routing ms. A likely situation may arise in case there are traffic jams Protocols implement route determination on a demand or and redundant packets of multiple nodes consume the need basis and maintain only the routes that are currently in bandwidth. use, thereby reducing the burden on the network when only a subset of available routes is in use at any time . Position based routing Protocols share the property of using geographic A. Safety Related Applications positioning information in order to select the next forwarding Typical safety applications are characterized as being hops. applications in which the main objective is to disseminate In our simulation, we have used the Reactive Routing certain event that have occurred in the vicinity of the sender. Protocols, namely DSR. Some examples described are: A. DSR  Cooperative awareness: to extend non-cooperative driver Dynamic source routing (DSR) [6] protocol is one of the assistance systems whose perception is limited to the example of an on-demand routing protocol that is based on operative range of on-board sensors (adverse weather, the concept of source routing. The DSR network is totally obstacles or dangerous road conditions). self organizing and self configuring. DSR uses no periodic  Cooperative assistance: distribution of data (e.g. warning routing messages like AODV, thereby reduces network of accidents). bandwidth overhead, conserves battery power and avoids large routing updates. B. Convenience and Personalized Applications The DSR routing protocol discovers routes and maintains Typical Convenience and personalized applications[4] are: information regarding the routes from one node to other by  Car to Mobile devices: Those applications between the car using two main mechanisms: route discovery and route and mobile devices (e.g. mobile phone, MP3, laptop, etc). maintenance. The DSR regularly updates its route cache for  Car to Home and Car to Office: Communications between the sake of new available easy routes. Route Discovery is the the car and private networks either at home or at office. mechanism by which a node S wishing to send a packet to a  Car to Enterprise: Communications between the car and destination node D obtains a source route to D. Route companies (e.g. restaurants, gas stations, parking areas, Discovery is used only when S attempts to send a packet to D etc) that give road services. and does not already know a route to D. Route Maintenance  Car to infrastructure: Information received by a car from is the mechanism by which node S is able to detect, with the hot spots giving road and traffic information and car help of a source route to D, if the network topology has access to Internet. changed such that it can no longer use its route to D because a  Car to Car: Exchange of information between car users link along the route no longer works. If a link failure is found (e.g. files, platoon traveling, etc). between source and destination, the source node tries to find another route to the destination or invokes Route Discovery DSR has a unique advantage of source routing. As the route is part of the packet itself, routing loops, either III. ROUTING PROTOCOLS short – lived or long – lived, cannot be formed as they can be immediately detected and eliminated. The packet in DSR In VANET, the routing protocols are classified into two carries all information pertaining to route in its preamble categories: Topology based and Position based Routing (header) thus permitting the intermediate nodes to cache the Protocols. Topology based routing protocols use links routing information in their route tables for their future use. information that exist in the network to perform packet forwarding. They are further divided into Proactive and IV. RESEARCH METHODOLOGY USED Reactive. To carry out the experiments in this paper, MOVE along with SUMO and NS2 is used. A. MOVE A tool MOVE (MObility model generator for Vehicular networks) [7] to facilitate users to rapidly generate realistic mobility models for VANET simulations. MOVE is currently implemented in java and is built on top of an open source micro-traffic simulator SUMO. By providing a set of Graphical User Interfaces that automate the simulation script generation, MOVE allows the user to quickly generate realistic simulation scenarios without the hassle of writing simulation scripts as well as learning about the internal details of the simulator. The output of MOVE is a mobility Figure 2. Classification of routing protocols[5] trace file that contains information about realistic vehicle movements which can be immediately used by popular 268 All Rights Reserved © 2012 IJARCET
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 simulation tools such as ns-2. The architecture of MOVE is It consists of two simulation tools. The network simulator shown in Figure 3. (ns) contains all commonly used IP protocols. The network The two main function of MOVE are: animator (NAM) is use to visualize the simulations.  MAP Editor It is packaged with a bundle of rich libraries for simulating  Vehicle Movement Editor wireless networks. All the mobile nodes in NS-2 quickly The Map Editor is used to create the road topology. Currently assume that they are the part of Ad-hoc network and the our implementation provides three different ways to create simulation mobile nodes connected with infrastructure the road map – the map can be manually created by the user, networks are not really possible. generated automatically, or imported from existing real world maps such as publicly available TIGER. We have also V. SIMULATION integrated Google Earth into MOVE to facilitate the creation The simulation parameters used and the simulation setup of nodes in a realistic setting. The Vehicle Movement Editor for this study are described in this section. allows the user to specify the trips of vehicles and the route that each vehicle will take for one particular trip. A. Simulation Setup Simulation environment consists of 4,10 and 15 wireless vehicle nodes which are moving on the lanes of mobility model used and forming a Vehicular Ad-hoc Network, moving about over a 652meters X 752 meters area for 1000 seconds of simulated time. The table below list the details of the simulation setup used in this simulation based analysis of DSR protocol. Table 1: Simulation Setup Figure 3. MOVE architecture B. SUMO NS version NS-2.33 “Simulation of Urban MObility" (SUMO) [8] is an open MOVE version 2.64 source, highly portable, microscopic road traffic simulation package designed to handle large road networks. It allows the SUMO version 0.12.3 user to build a customized road topology, in addition to the import of different readymade map formats of many cities Tracegraph version 2.0.2 and towns of the world. Figure 4. shows SUMO visualization. DSR NS-2 Default No. Of nodes 4,10,15 Traffic type TCP Channel Type Wireless Channel Network Interface Type Wireless physical Antenna model Omnidirectional Radio Propagation Model Two Ray Ground Adhoc Routing Protocol DSR Figure 4. SUMO Visualization MAC type IEEE 802.11 C. NS-2 The Network Simulator (ns2) [9] is a discrete event Simulation Time 1000 seconds driven simulator developed at UC Berkeley. We are using Network Simulator NS2 for simulations of protocols. It Data Type CBR(Constant Bit Rate) provides substantial support for simulation of TCP, routing and multicast protocols over wired and wireless networks. Data packet size 1000 bytes Ns-2 code is written either in C++ and OTCL and is kept in a Window Size 20 separate file that is executed by OTCL interpreter, thus generating an output file for NAM (Network animator) [10]. Scenario Urban It then plots the nodes in a position defined by the code script Road Traffic Direction and exhibits the output of the nodes communicating with Multidirectional each other. Queue Length 50 269 All Rights Reserved © 2012 IJARCET
  • 4. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 B. Simulation Parameters For this study three performance metrics are selected namely:- 1) Throughput: Throughput describes as the total number of received packets at the destination out of total transmitted packets. It is the average rate of successful message delivery over a communication channel. It is the number of received packets per TIL (Time Interval Length). This data may be delivered over a physical or logical link, or pass through a certain network node. The throughput is usually measured Figure 6. Cumulative sum of dropped packets vs event time in bits per second (bit/s or bps), and sometimes in data for 10 nodes packets per second or data packets per time interval length(TIL). Total no. of received packets at destination * packet size T = ---------------------------------------------------------- Total simulation time 2) Packets drop: The number of packets dropped at a given instance of time in the simulation run determines the efficiency of the protocol. The reason for packet drop may arise due to congestion, faulty hardware and queue overflow etc. 3) Simulation Time: It describes the total time taken by the Figure 7. Cumulative sum of dropped packets vs event time simulator NS-2 to simulate the individual routing protocol. for 15 nodes VI. RESULTS AND ANALYSIS INFERENCE: The number of dropped packets increases with the increase in number of nodes. The packet loss is The DSR protocol is being simulated over a realistic mobility always more at the initial stage and then increases slowly model and the results are analyzed in different node densities with the event time. The event time interval also decreases as of 4 nodes, 10 nodes and 15 nodes. the number of nodes increases due to the increase in dropped packets. A. Cumulative sum of dropped packets vs event time B. Throughput of dropping packets In this case, the number of dropped packets are analysed in three cases of 4 nodes, 10 nodes, and 15 nodes. Now, the throughput of dropped packets is analysed for 4, 10 and 15 nodes. Figure 5. Cumulative sum of dropped packets vs event time for 4 nodes Figure 8. Throughput of dropping packets for 4 nodes 270 All Rights Reserved © 2012 IJARCET
  • 5. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 Figure 9. Throughput of dropping packets for 10 nodes Figure 12. Packet size vs Average throughput of dropping packets for 10 nodes Figure 10. Throughput of dropping packets for 15 nodes Figure 13. Packet size vs Average throughput of dropping INFERENCE: As the number of nodes increases, the packets for 15 nodes steepness of graph increases as the throughput of dropping packets increases with the number of nodes. INFERENCE: The highest ratio of dropped packets are of lower sizes around 100 bytes. The maximum number of C. Packet size vs Average throughput of dropping packets dropped packets are of size below 110 bytes. The packet sizes are analysed for which there are more number of packets dropped. VII. CONCLUSION VANETs are an important research field which is emerging nowdays. It defines the important technology required to support Intelligent Transportation Systems (ITS) applications. Instead of developing the all new protocols for VANET, an insight has been made to already existing MANET protocols such as DSR. DSR is a reactive routing protocol and has been extended on VANET for simulations under MOVE and SUMO with mobility models taken from MOVE. The experiment has been conducted for 4 nodes, 10 nodes and 15 nodes to understand the behavior of dropped packets. The analysis against different parameters such as sum of dropped packets, throughput and packet size has been done and following Figure 11. Packet size vs Average throughput of dropping observations has been made: packets for 4 nodes 1) The number of dropped packets increases with increase in number of nodes. 2) The throughput of dropping packets increases with the increase in the number of nodes from 4 to 15, as the 271 All Rights Reserved © 2012 IJARCET
  • 6. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 number of dropped packets increases. 3) The more number of dropped packets are recorded for the packet sizes between 80 to 100 bytes for all the three scenarios of 4, 10 and 15 nodes. The maximum nodes considered in the work are 15 due to hardware constraints of the computer. So, it would be interesting to see the behaviour of the DSR protocol for the higher number of nodes, for which the machine of higher configuration will be required. ACKNOWLEDGMENT I would like to thank all the anonymous reviewers for their constructive feedback on the work presented over here. REFERENCES [1] Vanet Simulator, Report for the Computer Security exam at the Politecnico di Torino Walter Dal Mut, Armand Sofack. [2] Thomas D.C. Little and Ashish Agarwal, “An Information Propagation Scheme for VANETs”, Proceedings of the 8th International IEEE Conference on Intelligent Transportation Systems, Vienna, Austria, September 13-16, 2005. [3] Gayathri Chandrasekaran, “VANETs: The Networking Platform for Future Vehicular Applications”, Department of Computer Science, Rutgers University. [4] R. Mangharam, D. Weller, R. Rajkumar, P. Mudalige, and F. Bai, “Groovenet: A hybrid simulator for vehicle-to-vehicle networks,” in Mobile and Ubiquitous Systems - Workshops, 3rd Annual International Conference , 2006. [5] Kevin C. Lee, Uichin Lee, Mario Gerla,“Survey of Routing Protocols in Vehicular Ad Hoc Networks”, RoutingBookChapterKLULMario.pdf. [6] Johnson, D. B. and Maltz, D. A. (1996), “Dynamic Source Routing in Ad Hoc Wireless Networks,” Mobile Computing, T. Imielinski and H. Korth, Eds., Ch. 5, Kluwer, 1996, pp. 153–81. [7] Pranav Kumar Singh, Kapang Lego and Dr. Themrichon Tuithung, “Simulation based Analysis of Adhoc Routing Protocol in Urban and Highway Scenario of VANET”, International Journal of Computer Applications (0975 – 8887) Volume 12– No.10, January 2011. [8] SUMO (2012). “Simulation of Urban Mobility”. Accessed on 11 May, 2012 from http://sumo.sourceforge.net/docs/bibliography.shtml. [9] Ke Liu “Network Simulator 2: Introduction”, Dept. Of Computer Science, SUNY Binghamton, available at http://www.cs.binghamton.edu/~kliu/cs580t/ns2pre.pdf. [10] NAM Network Animator. http://www.isi.edu/nsnam/nam/ Dr. A K Verma is currently a faculty in the department of Computer Science and Engineering at Thapar University, Patiala. He received his B.S., M.S. and Doctorate in 1991, 2001 and 2008, respectively, majoring in Computer science and engineering. He has worked as Lecturer at M.M.M. Engg. College, Gorakhpur from 1991 to 1996. He joined Thapar University in 1996 and is presently associated with the same Institute. He has been a visiting faculty to many institutions. He has published over 100 papers in referred journals and conferences (India and Abroad). He has chaired various sessions in the International and National Conferences. He is a MIEEE, MACM, MISCI, LMCSI, MIETE, GMAIMA. He is a certified software quality auditor by MoCIT, Govt. of India. His research interests include wireless networks, routing algorithms and cloud computing. Avleen Kaur Malhi is currently pursuing her M.E. in Computer Science and Engineering from Thapar University. She is doing her thesis work in the area of Wireless Ad-Hoc Networks. She has completed her B.Tech from Guru Nanak Dev Engineering College, Ludhiana in 2010. Her research interests are VANETs and Wireless Ad-hoc Networks. 272 All Rights Reserved © 2012 IJARCET